Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 107

Full-Text Articles in Business

Investigating The Factors Influencing Customers’ Adoption Of Online Banking In The United Arab Emirates, Samar Mouakket Jan 2009

Investigating The Factors Influencing Customers’ Adoption Of Online Banking In The United Arab Emirates, Samar Mouakket

Journal of International Technology and Information Management

The goal of this paper is to increase the awareness of the exogenous factors that influence customers’ attitude in the United Arab Emirates (UAE) towards online banking in the light of the Technology Acceptance Model (TAM). The study investigates the effect of three exogenous factors namely computer self-efficacy, security issues, and website features on the TAM. The proposed modified TAM model has been tested with a survey sample of 461 which has been distributed among different customers in the UAE. The data has been analyzed using Structural Equation Modeling (SEM) to evaluate the strength of the hypothesized relationships. The results …


The Moderating Effects Of Technology On Career Success: Can Social Networks Shatter The Glass Ceiling?, Paul Fadil, Cindi Smatt, Sharon L. Segrest, Crystal Owen Jan 2009

The Moderating Effects Of Technology On Career Success: Can Social Networks Shatter The Glass Ceiling?, Paul Fadil, Cindi Smatt, Sharon L. Segrest, Crystal Owen

Journal of International Technology and Information Management

This paper reviews the demographic predictors of career success and proposes that technology plays a critical role in alleviating career success barriers for various demographic groups who have historically encountered barriers. Specifically we propose that technology can act as a moderator allowing minority groups greater participation and acceptance in networks. And, ultimately the greater participation and acceptance in networks will lead to greater career success for groups who have typically encountered “glass ceilings” based on demographic variables such as gender, age, race and ethnicity.


It Alignment With Business Strategies In Healthcare Organizations: An Empirical Analysis, Zach G. Zacharia, David S. Preston, Chad W. Autry, Charles W. Lamb Jan 2009

It Alignment With Business Strategies In Healthcare Organizations: An Empirical Analysis, Zach G. Zacharia, David S. Preston, Chad W. Autry, Charles W. Lamb

Journal of International Technology and Information Management

This paper describes a study that assessed the performance implications of aligning information technology (IT) strategy to overall business strategy across a variety of health care organization (HCO) structures. We obtained survey results from senior executives of 178 hospitals to identify key configurations of IT strategic practices, business strategy and HCO structures. Using K- means cluster analysis, we identified which business strategies correlate strongly with certain IT strategy types. Our results indicate that HCOs achieve superior performance through unique combinations of business and IT strategy, suggesting that correctly aligning these strategies is a critical decision for healthcare organizations.


Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl Jan 2009

Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl

Journal of International Technology and Information Management

The development of ICT policies within developing countries in the past ten years has opened up a new area for study. These documents chart the ambitions of the countries for the use of ICT to promote rapid development. As such they are intercultural documents, developing at the interface between the culture of the country and western economic culture. This paper develops a critical approach to understanding these documents and studying their message. The approach involves the preparation of a critical dictionary which identifies relevant terms within the ICT policy document and reflects on their multiple meanings. The approach was applied …


Strategic Approaches To Erp Implementation, Farshad Salimi, Ben Dankbaar Jan 2008

Strategic Approaches To Erp Implementation, Farshad Salimi, Ben Dankbaar

Journal of International Technology and Information Management

Strategic reasoning behind ERP triggers a specific path to ERP implementation. In this article we present a simple typology of ERP implementation approaches based on literature review and an empirical research for both manufacturing and services. We distinguish between bottom-up and top-down approaches and between process-oriented and technology-oriented approaches and we discuss the differences between the four resulting types of implementation approaches.


Project Management: Is/It Research Challenges, Debbie Tesch, Lewis R. Ireland, Julie Yu-Chih Liu Jan 2008

Project Management: Is/It Research Challenges, Debbie Tesch, Lewis R. Ireland, Julie Yu-Chih Liu

Journal of International Technology and Information Management

A major challenge in Information Systems and Information Technology is to improve the ability to conceptualize, design, develop and deliver information systems that meet customer requirements. Project management is often adopted to create solutions that work and meet customer needs. The principles of project management as defined by the Project Management Institute, can improve project success rates. Researchers in the project management need to help practitioners understanding the impact of different principles on the success of IS development. This study undertakes a survey of project management experts on the state of practice and research to examine the need for improving …


Technology Support For The Classroom: Technology Alternatives To The Traditional Classroom, Michael L. Gibson, Mari W. Buche, Jerry J. Waite Jan 2008

Technology Support For The Classroom: Technology Alternatives To The Traditional Classroom, Michael L. Gibson, Mari W. Buche, Jerry J. Waite

Journal of International Technology and Information Management

As technology continues to advance, instructors in higher education are able to enhance course instruction. Course support tools can be customized to meet the needs of the instructor, including file sharing, grade tracking, communicating, and making announcements. Blended learning advances course enhancements to include integrated solutions such as links to electronic textbooks and assignments. The most advanced use of technology for educational purposes is found in the distance learning format. This paper describes various uses of technology to support classroom instruction. Examples are provided.


Seniors And Information Technology: Are We Shrinking The Digital Divide?, Mark E. Mcmurtrey, Ronald E. Mcgaughey, James R. Downey Jan 2008

Seniors And Information Technology: Are We Shrinking The Digital Divide?, Mark E. Mcmurtrey, Ronald E. Mcgaughey, James R. Downey

Journal of International Technology and Information Management

The “digital divide” has been present in the field of information technology (IT) since the inception of the digital computer. Throughout the course of history, one group (or more) has had better access to computer and information technology than another faction. For example: rich versus poor, young versus old, advanced societies versus less developed countries, etc. This disparity has existed for a variety of reasons, among them political, cultural, economic and even class or socioeconomic in nature. This paper examines one particular component of this phenomenon, the “gray divide” pertaining to the use of IT by our elderly, or senior …


The Use Of Strategic Forces To Understand Competitive Advantages Provided By Information Technology, Gerald E. Evans, Clyde Neu Jan 2008

The Use Of Strategic Forces To Understand Competitive Advantages Provided By Information Technology, Gerald E. Evans, Clyde Neu

Journal of International Technology and Information Management

Porter’s Five Forces model of business strategy is foundational to understanding strategic forces and the role of information technology in the larger strategic framework of an organization. The authors describe how information technology changes the strength and/or influence of the competitive forces in Porter’s model. Furthermore, understanding how specific technologies potentially change specific forces within Porter’s model is the foundation of IT strategy. This theoretical framework of strategic alignment is developed through cases demonstrating how specific technologies change the strategic forces within specific industries and how organizations should take advantage of these changing forces. Empirical evidence for the validity of …


A Primary Study Of Attributes Of Innovations During The Prediffusion Stage, Frank M. Valier, Richard V. Mccarthy, Jay E. Aronson Jan 2008

A Primary Study Of Attributes Of Innovations During The Prediffusion Stage, Frank M. Valier, Richard V. Mccarthy, Jay E. Aronson

Journal of International Technology and Information Management

We provide a theoretical model for testing the adoption of information technology during the prediffusion stage (research and development and early trials) of an innovation. The model was tested using Linux based applications of Open Source Software (OSS). The results of surveying 1000 members of the Linux User Groups WorldWide (LUGWW) are presented. This study is significant because it provides empirical evidence that attributes of innovations correlate with adoption during the prediffusion stage (research and development) of an innovation. This extends diffusion of innovations research and has important implications for DOI theory and practice.


Linking Information Technology And Competitive Strategy: Evidence From China’S Third-Party Logistics Industry, Fujun Lai, Dahui Li, Qiang Wang Jan 2008

Linking Information Technology And Competitive Strategy: Evidence From China’S Third-Party Logistics Industry, Fujun Lai, Dahui Li, Qiang Wang

Journal of International Technology and Information Management

This study examined how information technology (IT) influences competitive strategies of third- party logistics (3PL) providers in mainland China. First, we examined the influences of IT on the firm’s IT advantage over its competitors. Second, the relationship between IT and competitive strategy was examined. The results show that IT has a significant influence on a firm’s IT advantage and its competitive strategy.


Antecedents And Outcomes Of The Flow Experience: An Empirical Study In The Context Of Online Gaming, Clyde W. Holsapple, Jiming Wu Jan 2008

Antecedents And Outcomes Of The Flow Experience: An Empirical Study In The Context Of Online Gaming, Clyde W. Holsapple, Jiming Wu

Journal of International Technology and Information Management

This study uses flow theory and the technology acceptance model (TAM) to provide new insight into the impact of enjoyment, one important dimension of flow, on user satisfaction, user beliefs, and behavioral intention to use. In addition, based on the propositions that knowledge results in an increased ability for activity and that flow is an emotional state of activity, this paper adopts a process view of knowledge to examine the role of knowledge in predicting enjoyment. The foregoing concepts are represented in a nomological network of enjoyment. Associated hypotheses are tested by using questionnaire responses of 253 online game players.


Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz Jan 2007

Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz

Journal of International Technology and Information Management

Policy makers and researchers from a wide range of perspectives have expressed concern about the interplay between privacy rights and information exchanges via the Internet. Of particular interest has been the challenge of protecting sensitive personal information. In this paper, we assert that user willingness to share sensitive data is an area of critical concern and requires additional investigation. In an effort to enrich the dialogue on the question of voluntary sharing of sensitive personal data via the Internet, we present a model showcasing the relationship between personal data sharing, privacy sensitivity, and technology trust and discuss how organizations can …


Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan Jan 2007

Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan

Journal of International Technology and Information Management

Innovation is the process by which knowledge is transformed into products and services which in turn fuels economic development to create wealth and generates improvements in the standard of living. With the advance of technology, social networks that play a fundamental role as a medium for the spread of information, ideas, and influence among its members have taken a form of digital city to offer a range of online services, including access to social environments, community services, and e-commerce to its infohabitants. This study investigates how social network theories can be used to design and manage a web-based digital city …


Development Of A Maintenance System Based On Web And Mobile Technologies, Jaime Campos, Erkki Jantunen, Om Prakash Jan 2007

Development Of A Maintenance System Based On Web And Mobile Technologies, Jaime Campos, Erkki Jantunen, Om Prakash

Journal of International Technology and Information Management

The paper reports the development of an e-monitoring and maintenance system based on web technology and mobile device, PDA. Rarity of experts led to the application of artificial intelligence and later, distributed artificial intelligence for condition monitoring and diagnosis of machine condition. Recently, web technology along with wireless communication is emerging as a potent tool in maintenance. It facilitates obtaining of the desired information by the relevant personnel at any time wherever he may be. The paper first describes the web and mobile architecture that formed the basis of the system and ICT tools used to communicate among the different …


Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo Jan 2007

Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo

Journal of International Technology and Information Management

Modern organizations adopt Enterprise Resource Planning systems (ERP) to integrate their organizational data resources into unified systems. Researchers tend to concentrate on ERP implementation issues with only a handful studying ERP system effectiveness or success in adopting organizations. In fact, none has studied how key organizational actors prioritize or rank relevant measures or items related to the effectiveness of such systems. This study is designed to fill this gap in research as it aims at investigating how two organizational stakeholder groups, i.e. information technology (IT) professionals and business managers prioritize relevant measures related to ERP systems effectiveness. Using surveys in …


A Predictive Analytic Model For Value Chain Management, Joseph O. Chan Jan 2007

A Predictive Analytic Model For Value Chain Management, Joseph O. Chan

Journal of International Technology and Information Management

Value chain management has gone through various stages of automation, integration and optimization in the past decades. While an optimization model for value chain deals with business scenarios under known circumstances, a predictive value chain model deals with probable circumstances in the future. Predictive analytics is succeeding optimization in the evolution of technologies supporting value chain management. This paper proposes a forward looking value creation model that combines the important concepts of value chain management and predictive analytics. An enterprise model for value chain predictive analytics that facilitates the convergence of information, operations and analytics is presented.


Analysis Of Competitive And Cooperative Technology Strategies Of Electronics Firms In The Greater China Region, Chung-Shing Lee, Kuei-Hsien Niu, Jonathan C. Ho Jan 2007

Analysis Of Competitive And Cooperative Technology Strategies Of Electronics Firms In The Greater China Region, Chung-Shing Lee, Kuei-Hsien Niu, Jonathan C. Ho

Journal of International Technology and Information Management

This paper integrates several theoretical perspectives to discuss the attributes of successful implementing strategic alliances and supply chain management strategies in high-technology industries. A multiple- case study of Taiwanese and Chinese electronics industries is presented to demonstrate how and why different firms apply different technology strategies in alliances and supply chain formations. Due to intense global competition, technological integration, and product life-cycle time compression, Taiwanese and Chinese high-technology firms are suggested to formulate and implement a coherent technology strategy to enhance their global competitiveness. By applying an integrated framework based on major theoretical perspectives studying the formulation and implementation of …


Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma Jan 2007

Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma

Journal of International Technology and Information Management

Prior research has mostly focused on transaction cost economics (TCE) to interpret the effect of information systems (IS) on organizational governance structures. A TCE based approach predicts that information technology (IT) will lead to increased use of electronic markets to coordinate economic transactions from electronic hierarchies. However, there is contradictory evidence in the literature regarding the rise and importance of cooperative relationships, joint ventures, and value-added partnerships integrated through information systems. To reconcile these contradictions, this paper analyzes the effect of IT on governance structures based on the TCE, social network theory, and the resource based view (RBV) of the …


An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka Jan 2007

An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka

Journal of International Technology and Information Management

Although the ideas and teachings of W. Edwards Deming have been implemented in organizations world- wide for over the past 50 years, only three studies have empirically tested a theoretical model grounded in the Deming Management Method. These studies focused on the manufacturing and services area. Today, quality management continues to be an area of interest both in project management and software engineering. The focus of this study is to test the Deming Management Method in information technology (IT) projects. A survey of 63 IT professionals provides empirical support for the Deming Management Method and its application to IT projects. …


In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen Jan 2007

In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen

Journal of International Technology and Information Management

Research has explored online users who are hooked on Internet applications such as chat rooms, web surfing, and interactive games. Online game addiction is one of the problems arisen from the use of the Internet. This study is motivated by a causal connection found from previous research of computer game addiction. The study describes two typical types of online games and looks further into the causes of the addiction by using two main theories. We also propose research hypotheses and discuss possible implications of online game addiction.


Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff Jan 2007

Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff

Journal of International Technology and Information Management

This paper looks at national attempts to promote economic growth through the Internet. Growth can be driven through service exports or internally through increased service transactions and fostering entrepreneurship. India is often held as an example of service exports, but economic statistics show that India might not be a good example for other nations because net service trade is negative and wages have been economically distorted. Ultimately, developing nations need to find internal growth models. Internal growth could be driven though increased consumption due to improved information, or increased investment expenditures from infrastructure investments.


Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem Jan 2007

Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem

Journal of International Technology and Information Management

The demand for information technology at institutions of higher education is increasing at a rapid pace. It is fueled by student, faculty, and administrative needs. This paper examines project management practices at these institutions with respect to the sizes of the institutions. Survey results indicate an emphasis on operational concerns at small and medium size institutions when selecting IT projects. The prominence of the role of project manager and adoption of formal PM tools/techniques by IT departments generally increase with the sizes of the institutions. The importance of having a project plan is recognized by all sizes of institutions of …


An Analysis Of The D Programming Language, Sumanth Yenduri, Louise Perkins, Md. Sarder Jan 2007

An Analysis Of The D Programming Language, Sumanth Yenduri, Louise Perkins, Md. Sarder

Journal of International Technology and Information Management

The C language and its derivatives have been some of the dominant higher-level languages used, and the maturity has stemmed several newer languages that, while still relatively young, possess the strength of decades of trials and experimentation with programming concepts. While C++ was a major step in the advancement from procedural to object-oriented programming (with a backbone of C), several problems existed that prompted the development of new languages. This paper focuses on one such language: D. D was designed as a potential successor to C++, supporting most features of C++’s class design and modifications intended to ease common program …


Regional Economic Development Issues Within The Information And Communications Technology (Ict) Industry, James M. Henson Jan 2006

Regional Economic Development Issues Within The Information And Communications Technology (Ict) Industry, James M. Henson

Journal of International Technology and Information Management

This exploratory research was initiated to develop a computer-based interview tool that would help determine the factors that companies in the information and communications technology (ICT) industry consider a problem in regards to the economic environment within a local study region. Topics included the labor market and community issues, including costs of doing business and quality-of-life questions. A computer-based process was employed in telephone interviews to solicit and record responses from executives in ICT-related companies for the 197 cases that are included in this study. Descriptive data are presented along with a first-order and a second-order factor analysis.


Enterprise Integrated Security Platform: A Comparison Of Remote Access And Extranet Virtual Private Networks, Emmanuel U. Opara, Jack T. Marchewka Jan 2006

Enterprise Integrated Security Platform: A Comparison Of Remote Access And Extranet Virtual Private Networks, Emmanuel U. Opara, Jack T. Marchewka

Journal of International Technology and Information Management

The Internet has created unprecedented opportunities for both organizations and individuals. However, these opportunities also have created a double-edge sword as organizations attempt to connect trading partners, customers, and remote users while providing adequate security measures that are flexible and cost-effective. This paper explores why secured socket layer (SSL) may be better tool for secured remote access and extranets by comparing it to internet protocol security virtual private networks (IPSec-based VPNs).


Cross-Border It-Support For The Management Of International Subsidiary Operations: The Diffusion Of Innovations-Based Conceptual Model, Arto Ojala, Nazmun Nahar Jan 2006

Cross-Border It-Support For The Management Of International Subsidiary Operations: The Diffusion Of Innovations-Based Conceptual Model, Arto Ojala, Nazmun Nahar

Journal of International Technology and Information Management

Rapid and effective internationalization has increasingly become important for high-tech companies. Establishing a foreign subsidiary can facilitate effective internationalization for a high-tech company. This study investigates how IT can provide cross-border support to manage international subsidiary operations and makes important theoretical contributions. The research results exhibit how companies can use cross-border IT-support to effectively share and utilize information from the target country environment for international subsidiary operations. This paper also introduces the diffusion of innovations-based conceptual model which deals with various factors that should be taken into account while operating a foreign subsidiary through IT support. The findings are useful …


Use Of Advanced Technologies And Information Solutions For North Sea Offshore Assets: Ambitious Changes And Socio-Technical Dimensions, Jayantha P. Liyanage, Eirik Bjerkebaek Jan 2006

Use Of Advanced Technologies And Information Solutions For North Sea Offshore Assets: Ambitious Changes And Socio-Technical Dimensions, Jayantha P. Liyanage, Eirik Bjerkebaek

Journal of International Technology and Information Management

The use of various forms of advanced technologies and information solutions are in common place to manage industrial assets today. This is widely seen as the way forward in various industrial sectors owing to range of commercial benefits offered by new technologies and its importance to gain competitive advantage. The objective of this paper is to describe such an ongoing major technology-dependent re- engineering process termed Integrated eOperations in oil and gas exploration and production business in North Sea since 2004-2005, and to highlight the nature of ambitious techno-managerial changes and its critical socio-technical dimensions. The change process focuses on …


Development Of A Risk Assessment Model For Global Information Technology Outsourcing, June Wei, Brian Peach Jan 2006

Development Of A Risk Assessment Model For Global Information Technology Outsourcing, June Wei, Brian Peach

Journal of International Technology and Information Management

Global Information Technology (IT) outsourcing has been recognized to have important potential benefits. However, researchers and practitioners also recognize potential risks involved in global IT outsourcing, which sometimes lead to undesirable consequences. This paper develops a model to assess risks in global IT outsourcing. Specifically, this paper begins by identifying global IT outsourcing risk factors by considering the national infrastructure, organizational infrastructure, and project environment. Second, a Global IT Outsourcing (GITO) engagement model for risk assessment is developed to logically link all these risk factors together. Third, one quantifiable approach based on a relative-weighted assessment model is presented to demonstrate …


The Coming Age Of Rfid Revolution, Mohsen Attaran Jan 2006

The Coming Age Of Rfid Revolution, Mohsen Attaran

Journal of International Technology and Information Management

Radio Frequency Identification, or RFID, has been around for decades and is being used in manufacturing to complement established barcodes for the past 25 years. Recently, many companies are embracing RFID as a competitive weapon that can improve their efficiencies, and provide significant business benefits. Despite many useful applications, the technology's potential has yet to be fully realized. The aim of this paper is to provide an overview of contemporary RFID systems, highlight its promises as well as its pitfalls, identify the implementation challenges and key business drivers, survey its application in various industries, and speculate about where this technology …